Patents Examined by Carl Colin
  • Patent number: 8549634
    Abstract: A method and apparatus for detecting a rogue access point in a communication network is described herein. The method includes a probing unit sending a pre-detection message to an associated access point in the communication network. The pre-detection message indicates a start of rogue access point detection mode and informs the associated access point not to respond to probe requests following the pre-detection message. The method further includes the probing unit broadcasting probe requests in the communication network. The probing unit detect that one or more of the plurality of access points is the rogue access point based on receiving a probe response in reply to the broadcasted probe request from the rogue access point. A method for detecting a rogue access point includes broadcasting a probe request with a proprietary information bit and detecting the rogue access point based on receiving a probe response for the broadcasted probe request.
    Type: Grant
    Filed: November 10, 2011
    Date of Patent: October 1, 2013
    Assignee: Symbol Technologies, Inc.
    Inventors: Pradip K. Dubey, Jitesh Narayan Verma
  • Patent number: 8544089
    Abstract: The auditing of a device that includes a physical memory is disclosed. One or more hardware parameters that correspond to a hardware configuration is received. Initialization information is also received. The physical memory is selectively read and at least one result is determined. The result is provided to a verifier.
    Type: Grant
    Filed: March 1, 2010
    Date of Patent: September 24, 2013
    Assignee: Fatskunk, Inc.
    Inventors: Bjorn Markus Jakobsson, Karl-Anders R. Johansson
  • Patent number: 8539254
    Abstract: In one embodiment of the invention, a method is provided for protecting against attacks on security of a programmable integrated circuit (IC). At least a portion of an encrypted bitstream input to the programmable IC is decrypted with a cryptographic key stored in the programmable IC. A number of failures to decrypt the encrypted bitstream is tracked. The tracked number is stored in a memory of the programmable IC that retains the number across on-off power cycles of the programmable IC. In response to the number of failures exceeding a threshold, data that prevents the decryption key from being used for a subsequent decryption of a bitstream is stored in the programmable IC.
    Type: Grant
    Filed: June 1, 2010
    Date of Patent: September 17, 2013
    Assignee: Xilinx, Inc.
    Inventors: Brendan K. Bridgford, Jason J. Moore, Stephen M. Trimberger, Eric E. Edwards
  • Patent number: 8539031
    Abstract: Technologies are described herein for displaying a list of people associated with a message item along with images and other personal context information in a PIM application. The people associated with the message item are identified and a list is generated containing a name, an image, and other personal context information for each. The list of people associated with the message item is displayed in a window of the PIM along with the information regarding the message item.
    Type: Grant
    Filed: June 27, 2008
    Date of Patent: September 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Can Mehmet Comertoglu, Andrew T. Dean, Autumn Lee Stroupe, Owen Braun, Adriana Cristina Popp
  • Patent number: 8533308
    Abstract: A traffic management device or other intermediate network device is configured to enable the device to support connection splitting and/or connection aggregation or to otherwise process network transactions for an arbitrary transaction-oriented protocol. The configuration may be accomplished by providing one or more traffic management rules defined by way of a scripting language and provided to an interpreter. The traffic management rule may follow a basic approach common to many protocols and is adapted to the particular protocol being supported. The rule may configure the network device to inspect incoming data, extract length and record type specifiers, buffer an appropriate amount of data to determine transactions or transaction boundaries, and perform other operations.
    Type: Grant
    Filed: October 5, 2005
    Date of Patent: September 10, 2013
    Assignee: F5 Networks, Inc.
    Inventor: Jesse Abraham Rothstein
  • Patent number: 8526617
    Abstract: A method of handling security configuration for a mobile device using a mapped security context in a wireless communication system includes utilizing the mapped security context to derive ciphering and integrity keys when security configuration, indicating a key update based on a cached security context, is received.
    Type: Grant
    Filed: September 14, 2009
    Date of Patent: September 3, 2013
    Assignee: HTC Corporation
    Inventor: Chih-Hsiang Wu
  • Patent number: 8528080
    Abstract: Files received by a mobile device are sampled for malware tracking. The method includes configuring file transfer mechanisms that use short-range communication technology on the mobile device to appear, to other devices, to be open for accepting all attempts to transfer files. The method further comprises intercepting files transferred via the short-range communication technology to the mobile device from another device. The method also comprises quarantining the files transferred to the mobile device and logging identifying information about each of the files quarantined and about the other devices from which each of the files originated. The method further includes providing the logged identifying information for the files received to a security server.
    Type: Grant
    Filed: September 15, 2009
    Date of Patent: September 3, 2013
    Assignee: Reefedge Networks, LLC
    Inventors: Bruce McCorkendale, John P. Kelly, Brian Hernacki
  • Patent number: 8522347
    Abstract: A global response network collects, analyzes, and distributes “cross-vector” threat-related information between security systems to allow for an intelligent, collaborative, and comprehensive real-time response.
    Type: Grant
    Filed: March 16, 2010
    Date of Patent: August 27, 2013
    Assignee: SonicWALL, Inc.
    Inventors: Boris Yanovsky, Scott D. Eikenberry, Bhuvan Racham, Nick Bilogorskiy, Gayatri Bhimaraju
  • Patent number: 8522047
    Abstract: A computer-implemented method of generating tamper-protected computer program code. The method comprises obtaining a representation of the computer program code, the computer program being adapted to cause a data processing system to perform a plurality of computational tasks in a first order of execution, each computational task being represented in the representation of the computer program code by at least one program statement; obtaining a plurality of alternative orders of execution of the computational tasks; generating an executable representation of the program code adapted to cause a data processing system to select a randomized order of execution from the plurality of alternative orders of execution and to execute the computational tasks in the selected randomized order of execution.
    Type: Grant
    Filed: June 25, 2008
    Date of Patent: August 27, 2013
    Assignee: Telefonaktiebolaget L M Ericsson (publ)
    Inventors: Johan Eker, Björn Johansson, Carl Von Platen
  • Patent number: 8522345
    Abstract: There are methods and apparatus, including computer program products, for managing hierarchical reference data. There is a Web page for access by a user, where the Web page includes (i) data representing a hierarchy and (ii) rules defining modifications that are permitted to be made to data. The user is enabled to make a real-time modification to the data based on the rules.
    Type: Grant
    Filed: November 1, 2010
    Date of Patent: August 27, 2013
    Assignee: FMR LLC
    Inventors: Dinesh Sharma, Mark Goldsmith, Venkat Narsimha Karedla, Brian G. Salloway, Michael Murphy
  • Patent number: 8516552
    Abstract: A first wireless end-user communication device comprising a user interface and at least one processor configured to: use a forwarding agent on the first wireless end-user communication device to forward traffic between a first wireless access network and one or more other wireless end-user communication devices according to a forwarding policy to implement a forwarding service, the forwarding policy associated with one or more policy settings, the one or more other wireless end-user communication devices communicatively coupled to the first wireless end-user communication device over a wireless local area network or a wireless personal area network; obtain, through the user interface, a modification request to modify an aspect of the forwarding service; modify at least one of the one or more policy settings based at least in part on the modification request; and provide an accounting of a usage associated with the forwarding service.
    Type: Grant
    Filed: April 4, 2012
    Date of Patent: August 20, 2013
    Assignee: Headwater Partners I LLC
    Inventor: Gregory G. Raleigh
  • Patent number: 8515065
    Abstract: An input processing circuit decodes a digital video signal selected by an input signal selector. Decryption circuits each decrypt the encryption of a video signal output from the input processing circuit, and generate an authentication key of the encryption. A video signal selector selects and outputs one of the video signals output from the decryption circuits, to a monitor. The decryption circuits each include a pseudo-signal generation circuit which extracts information from the video signal, and based on the extracted information, generates a pseudo-video signal.
    Type: Grant
    Filed: February 10, 2012
    Date of Patent: August 20, 2013
    Assignee: Panasonic Corporation
    Inventors: Shinya Murakami, Ryogo Yanagisawa, Syuji Kato, Toru Iwata
  • Patent number: 8510835
    Abstract: A client computer runs a communicator employed to connect to a server computer in a cloud. The communicator is updated on a regular basis to update its algorithms for processing raw data into secured data. The server computer receives and validates the secured data, and attempts to update the communicator if the secured data is invalid. The server computer may deem the client computer as being infected when the update is reinitiated a predetermined number of times. The raw data may be restructured, or encrypted using an encryption scheme where the key used for the encryption is not provided to the receiver of the data. The algorithm for data restructuring and encryption may be included in the update to the communicator. Communication between the client computer and the server computer may be on a dynamically selected channel indicated in a previous communication.
    Type: Grant
    Filed: September 18, 2009
    Date of Patent: August 13, 2013
    Assignee: Trend Micro Incorporated
    Inventors: Jayronn Christian Sulit Bucu, Frederic Fritz Anciano Vila, Nicholas Carlo Talens Ramos
  • Patent number: 8510412
    Abstract: The present invention is a system and method for creating and implementing transactional speech applications (SAs) using Web technologies, without reliance on server-side standard or custom services. A transactional speech application may be any application that requires interpretation of speech in conjunction with a speech recognition (SR) system, such as, for example, consumer survey systems. A speech application in accordance with the present invention is represented within a Web page, as an application script that interprets semantic objects according to a context. Any commonly known scripting language can be used to write the application script, such as JavaScript (or ECMAScript), PerlScript, and VBscript. The present invention is “Web-based” to the extent that it implements Web technologies, but it need not include or access the World Wide Web.
    Type: Grant
    Filed: September 6, 2011
    Date of Patent: August 13, 2013
    Assignee: Eliza Corporation
    Inventors: John Kroeker, Oleg Boulanov
  • Patent number: 8503855
    Abstract: An image processing apparatus includes an input unit which receives, from an image capturing apparatus, moving image data in which the shadow of a foreign substance adhered to the surface of an optical member is captured, an obtaining unit which obtains, from the moving image data, foreign substance information including information of the position and size of the foreign substance captured in the moving image data, a playback unit which can play back the moving image data while correcting the shadow of the foreign substance in the moving image data by using the foreign substance information, a display unit which displays an image played back by the playback unit, and a setting unit which sets, in accordance with the playback status of the moving image data, whether to perform processing of correcting the shadow of the foreign substance in each frame of the moving image data.
    Type: Grant
    Filed: March 26, 2009
    Date of Patent: August 6, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Takuya Shintani
  • Patent number: 8505065
    Abstract: A system is disclosed for creating and implementing an access control policy framework in a weakly coherent distributed collection. A collection manager may sign certificates forming equivalence classes of replicas that share a specific authority. The collection manager and/or certain privileged replicas may issue certificates that delegate authority for control of item policy and replica policy. Further certificates may be signed that create one or more items, set policy for these one or more items, and define a set of operations authorized on the one or more items. The certificates issued according to the present system for creating and implementing a control policy framework cannot be modified or simply overridden. Once a policy certificate is issued, it may only be revoked by the collection manager or by a replica having revocation authority.
    Type: Grant
    Filed: June 20, 2007
    Date of Patent: August 6, 2013
    Assignee: Microsoft Corporation
    Inventors: Edward P. Wobber, Martin Abadi, Thomas L. Rodeheffer
  • Patent number: 8503854
    Abstract: In a video playback apparatus that is capable of communicating with a printing device, if an event of which notification is to be given has occurs in the printing device, a situation in which viewing by the user is impeded by the notification and a situation in which unnecessary video is recorded are suppressed. If an error occurs in the printing device, the type of display information prevailing when the error is detected is discriminated (S34). In case of a moving-picture program broadcast, an error message is displayed and the display information starts being stored (S35), thereby making it possible to resume viewing after error recovery. On the hand, in the case of a still picture or other type of display information, an error message is displayed (S310) without storing display information, thereby suppressing unnecessary recording of display information.
    Type: Grant
    Filed: October 1, 2007
    Date of Patent: August 6, 2013
    Assignee: Canon Kabushiki Kaisha
    Inventor: Kazumi Suga
  • Patent number: 8499061
    Abstract: The invention relates to a method for inserting a new device in a community of devices wherein each device of the community is able to store insertion requests received from at least one new device and to forward these insertion requests to a device chosen by a user of the community for confirming authorization to join the community.
    Type: Grant
    Filed: February 16, 2005
    Date of Patent: July 30, 2013
    Assignee: Thomson Licensing
    Inventors: Olivier Heen, Nicolas Prigent
  • Patent number: 8495701
    Abstract: In one embodiment, a computer implemented method for indexing security policies is provided. The computer implemented method determines a policy vocabulary to form a set of policy elements, and creates an index from the set of policy elements. The computer implemented method further receives a request to form requested policy elements, locates requested policy elements in the index to form a set of returned policy elements, and identifies a rule for use with the returned policy elements.
    Type: Grant
    Filed: June 5, 2008
    Date of Patent: July 23, 2013
    Assignee: International Business Machines Corporation
    Inventor: Craig Robert William Forster
  • Patent number: 8489883
    Abstract: A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar in a virtual world. The watermark engine creates a watermark for the avatar using the security information and associates the watermark with the avatar. The watermark may comprise at least one of: security preferences for the avatar, contact information for an owner of the avatar, and graphical information to cause alteration of the avatar when the avatar is recorded.
    Type: Grant
    Filed: September 17, 2009
    Date of Patent: July 16, 2013
    Assignee: International Business Machines Corporation
    Inventors: Richard Dean Dettinger, Lydia Mai Do, Frederick Allyn Kulack, Kevin Glynn Paterson